General
-
Target
30dbf8a38ef44fcafeb10cf5339d7e124773d1c7f33e269f1100b6c4f93a134b
-
Size
477KB
-
Sample
210807-fz6xder65a
-
MD5
659bcefdb9c6e948d20cc2582fa081ec
-
SHA1
f70f4874c0ad8df7a43c8f302e6720eac05945ee
-
SHA256
30dbf8a38ef44fcafeb10cf5339d7e124773d1c7f33e269f1100b6c4f93a134b
-
SHA512
dc88174b37aa84ce994091a71a202f5b285bcfce9dac6b7a181aa1d5054d450dde98be8091dbddd11c55f4f85f06642ce5a329162986293ba784495110ce5c44
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
30dbf8a38ef44fcafeb10cf5339d7e124773d1c7f33e269f1100b6c4f93a134b
-
Size
477KB
-
MD5
659bcefdb9c6e948d20cc2582fa081ec
-
SHA1
f70f4874c0ad8df7a43c8f302e6720eac05945ee
-
SHA256
30dbf8a38ef44fcafeb10cf5339d7e124773d1c7f33e269f1100b6c4f93a134b
-
SHA512
dc88174b37aa84ce994091a71a202f5b285bcfce9dac6b7a181aa1d5054d450dde98be8091dbddd11c55f4f85f06642ce5a329162986293ba784495110ce5c44
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-